Araştırma Makalesi
BibTex RIS Kaynak Göster
Yıl 2019, Cilt: 1 Sayı: 2, 41 - 50, 29.12.2019

Öz

Kaynakça

  • [1] A.Y. Niyat, M. H. Moattar, and M. N. Torshiz, Color image encryption based on hybrid hyper-chaotic system and cellular automata, Optics and Lasers in Engineering 90, 225-237 (2017).
  • [2] A. Souyah, and K. M. Faraoun, Fast and efficient randomized encryption scheme for digital images based on quadtree decomposition and reversible memory cellular automata, Nonlin- ear Dynamics 84,715-732 (2016).
  • [3] L. Xu, Z. Li, J. Li, and W. Hua, A novel bit-level image encryption algorithm based on chaotic maps, Optics and Lasers in Engineering 78, 17-25 (2016).
  • [4] C. E. Shannon, Communication theory of secrecy systems, Bell system technical journal 28, 656-715 (1949).
  • [5] G. Alvarez, and S. Li, Some basic cryptographic requirements for chaos-based cryptosystems, International journal of bifurcation and chaos 16(22), 2129-2151 (2006).
  • [6] H. Liu, and Y. Liu, Cryptanalyzing an image encryption scheme based on hybrid chaotic system and cyclic elliptic curve, Optics & Laser Technology 56, 15-19 (2014).
  • [7] K. M. Faraoun, A parallel block-based encryption schema for digital images using reversible cellular automata, Engineering Science and Technology, an International Journal 17, 85-94 (2014).
  • [8] Ping, F. Xu, and Z. J. Wang, Image encryption based on non-affine and balanced cellular automata, Signal Processing 105, 419-429 (2014).
  • [9] B. Jeyaram and R. Raghavan, New cellular automata-based image cryptosystem and a novel non-parametric pixel randomness test, Security and Communication Networks 9, 3365-3377 (2016).
  • [10] D. Dey, D. Giri, B. Jana, T. Maitra and R.N. Mohapatra, Linear-feedback shift register- based multi-ant cellular automation and chaotic map-based image encryption, Security and Privacy 1(6), 1-11 (2018).
  • [11] X. Wang and D. Luan, A novel image encryption algorithm using chaos and reversible cellular automata, Communications in Nonlinear Science and Numerical Simulation 18(11), 3075-3085 (2013).
  • [12] K. M. Faraoun, Fast encryption of RGB color digital images using a tweakable cellular automaton based schema, Optics & Laser Technology, 64, 145-155 (2014).
  • [13] A.S. Rajput and M.A. Sharma, Novel Image Encryption and Authentication Scheme Using Chaotic Maps, In Advances in Intelligent Informatics, Springer, Cham, 277-286 (2015).
  • [14] S. Wolfram, Cellular automata and complexity, collected papers. CRC Press (2018).

A Block-Based Image Encryption Scheme Using Cellular Automata with Authentication Capability

Yıl 2019, Cilt: 1 Sayı: 2, 41 - 50, 29.12.2019

Öz

This paper presents an authenticated image encryption algorithm based on cellular automata. To accelerate the process, we divide the image into blocks and use a permutation algorithm to apply chaos on the blocks and then use cellular automata-based algorithm to change the pixels. The authentication mechanism of our scheme, adjustable to the desired level, can detect slight tampering in the cipher image before full decryption. Existing image encryption schemes usually cannot provide parallel processing capability and high sensitivity to changes simultaneously. This study tries to overcome this drawback as well. We show that our proposal fulfills desired security properties including large key space and robustness against statistical, differential and chosen-plaintext attacks.


Kaynakça

  • [1] A.Y. Niyat, M. H. Moattar, and M. N. Torshiz, Color image encryption based on hybrid hyper-chaotic system and cellular automata, Optics and Lasers in Engineering 90, 225-237 (2017).
  • [2] A. Souyah, and K. M. Faraoun, Fast and efficient randomized encryption scheme for digital images based on quadtree decomposition and reversible memory cellular automata, Nonlin- ear Dynamics 84,715-732 (2016).
  • [3] L. Xu, Z. Li, J. Li, and W. Hua, A novel bit-level image encryption algorithm based on chaotic maps, Optics and Lasers in Engineering 78, 17-25 (2016).
  • [4] C. E. Shannon, Communication theory of secrecy systems, Bell system technical journal 28, 656-715 (1949).
  • [5] G. Alvarez, and S. Li, Some basic cryptographic requirements for chaos-based cryptosystems, International journal of bifurcation and chaos 16(22), 2129-2151 (2006).
  • [6] H. Liu, and Y. Liu, Cryptanalyzing an image encryption scheme based on hybrid chaotic system and cyclic elliptic curve, Optics & Laser Technology 56, 15-19 (2014).
  • [7] K. M. Faraoun, A parallel block-based encryption schema for digital images using reversible cellular automata, Engineering Science and Technology, an International Journal 17, 85-94 (2014).
  • [8] Ping, F. Xu, and Z. J. Wang, Image encryption based on non-affine and balanced cellular automata, Signal Processing 105, 419-429 (2014).
  • [9] B. Jeyaram and R. Raghavan, New cellular automata-based image cryptosystem and a novel non-parametric pixel randomness test, Security and Communication Networks 9, 3365-3377 (2016).
  • [10] D. Dey, D. Giri, B. Jana, T. Maitra and R.N. Mohapatra, Linear-feedback shift register- based multi-ant cellular automation and chaotic map-based image encryption, Security and Privacy 1(6), 1-11 (2018).
  • [11] X. Wang and D. Luan, A novel image encryption algorithm using chaos and reversible cellular automata, Communications in Nonlinear Science and Numerical Simulation 18(11), 3075-3085 (2013).
  • [12] K. M. Faraoun, Fast encryption of RGB color digital images using a tweakable cellular automaton based schema, Optics & Laser Technology, 64, 145-155 (2014).
  • [13] A.S. Rajput and M.A. Sharma, Novel Image Encryption and Authentication Scheme Using Chaotic Maps, In Advances in Intelligent Informatics, Springer, Cham, 277-286 (2015).
  • [14] S. Wolfram, Cellular automata and complexity, collected papers. CRC Press (2018).
Toplam 14 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Yazılım Mühendisliği (Diğer)
Bölüm Articles
Yazarlar

Saeideh Kabirirad Bu kişi benim

Ziba Eslami

Yayımlanma Tarihi 29 Aralık 2019
Kabul Tarihi 27 Kasım 2019
Yayımlandığı Sayı Yıl 2019 Cilt: 1 Sayı: 2

Kaynak Göster

Creative Commons License
The published articles in PIMS are licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.